Login / Signup

Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models.

Zhenkai LiangR. Sekar
Published in: ACSAC (2005)
Keyphrases
  • buffer overflow
  • parameter estimation
  • probabilistic model
  • feature selection
  • computer systems
  • anomaly detection